Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Jun 23 19:10:57 debian ipsec[3489]: 09[ENC] parsed ID_PROT request 0 [ SA V V V V V V V V ]
- Jun 23 19:10:57 debian ipsec[3489]: 09[IKE] received NAT-T (RFC 3947) vendor ID
- Jun 23 19:10:57 debian ipsec[3489]: 09[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID
- Jun 23 19:10:57 debian ipsec[3489]: 09[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
- Jun 23 19:10:57 debian ipsec[3489]: 09[IKE] received draft-ietf-ipsec-nat-t-ike-00 vendor ID
- Jun 23 19:10:57 debian ipsec[3489]: 09[IKE] received XAuth vendor ID
- Jun 23 19:10:57 debian ipsec[3489]: 09[IKE] received Cisco Unity vendor ID
- Jun 23 19:10:57 debian ipsec[3489]: 09[IKE] received FRAGMENTATION vendor ID
- Jun 23 19:10:57 debian ipsec[3489]: 09[IKE] received DPD vendor ID
- Jun 23 19:10:57 debian ipsec[3489]: 09[IKE] 178.205.63.179 is initiating a Main Mode IKE_SA
- Jun 23 19:10:57 debian ipsec[3489]: 09[ENC] generating ID_PROT response 0 [ SA V V V V ]
- Jun 23 19:10:57 debian ipsec[3489]: 09[NET] sending packet: from 172.104.143.35[500] to 178.205.63.179[20675] (160 bytes)
- Jun 23 19:10:57 debian ipsec[3489]: 10[NET] received packet: from 178.205.63.179[20675] to 172.104.143.35[500] (252 bytes)
- Jun 23 19:10:57 debian ipsec[3489]: 10[ENC] parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
- Jun 23 19:10:57 debian ipsec[3489]: 10[IKE] remote host is behind NAT
- Jun 23 19:10:57 debian ipsec[3489]: 10[ENC] generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
- Jun 23 19:10:57 debian ipsec[3489]: 10[NET] sending packet: from 172.104.143.35[500] to 178.205.63.179[20675] (268 bytes)
- Jun 23 19:10:57 debian ipsec[3489]: 12[NET] received packet: from 178.205.63.179[20642] to 172.104.143.35[4500] (108 bytes)
- Jun 23 19:10:57 debian ipsec[3489]: 12[ENC] parsed ID_PROT request 0 [ ID HASH ]
- Jun 23 19:10:57 debian charon[3507]: 16[NET] received packet: from 178.205.63.179[20642] to 172.104.143.35[4500] (140 bytes)
- Jun 23 19:10:57 debian ipsec[3489]: 12[CFG] looking for HybridInitRSA peer configs matching 172.104.143.35...178.205.63.179[10.184.115.78]
- Jun 23 19:10:57 debian ipsec[3489]: 12[CFG] selected peer config "IKEv1-Xauth"
- Jun 23 19:10:57 debian ipsec[3489]: 12[IKE] authentication of 'CN=vpn.krasovsky.me' (myself) successful
- Jun 23 19:10:57 debian ipsec[3489]: 12[IKE] sending end entity cert "CN=vpn.krasovsky.me"
- Jun 23 19:10:57 debian ipsec[3489]: 12[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=Let's Encrypt Authority X3"
- Jun 23 19:10:57 debian ipsec[3489]: 12[ENC] generating ID_PROT response 0 [ ID CERT CERT SIG ]
- Jun 23 19:10:57 debian ipsec[3489]: 12[ENC] splitting IKE message with length of 2812 bytes into 3 fragments
- Jun 23 19:10:57 debian ipsec[3489]: 12[ENC] generating ID_PROT response 0 [ FRAG(1) ]
- Jun 23 19:10:57 debian ipsec[3489]: 12[ENC] generating ID_PROT response 0 [ FRAG(2) ]
- Jun 23 19:10:57 debian ipsec[3489]: 12[ENC] generating ID_PROT response 0 [ FRAG(3/3) ]
- Jun 23 19:10:57 debian ipsec[3489]: 12[NET] sending packet: from 172.104.143.35[4500] to 178.205.63.179[20642] (1248 bytes)
- Jun 23 19:10:57 debian ipsec[3489]: 12[NET] sending packet: from 172.104.143.35[4500] to 178.205.63.179[20642] (424 bytes)
- Jun 23 19:10:57 debian ipsec[3489]: 12[ENC] generating TRANSACTION request 890732577 [ HASH CPRQ(X_USER X_PWD) ]
- Jun 23 19:10:57 debian ipsec[3489]: 12[NET] sending packet: from 172.104.143.35[4500] to 178.205.63.179[20642] (92 bytes)
- Jun 23 19:10:57 debian ipsec[3489]: 11[NET] received packet: from 178.205.63.179[20642] to 172.104.143.35[4500] (124 bytes)
- Jun 23 19:10:57 debian ipsec[3489]: 11[ENC] parsed INFORMATIONAL_V1 request 4101358623 [ HASH N(INITIAL_CONTACT) ]
- Jun 23 19:10:57 debian ipsec[3489]: 11[NET] received packet: from 178.205.63.179[20642] to 172.104.143.35[4500] (124 bytes)
- Jun 23 19:10:57 debian ipsec[3489]: 11[ENC] parsed TRANSACTION response 890732577 [ HASH CPRP(X_USER X_PWD) ]
- Jun 23 19:10:57 debian ipsec[3489]: 11[IKE] XAuth authentication of 'savely' successful
- Jun 23 19:10:57 debian ipsec[3489]: 11[ENC] generating TRANSACTION request 3042743947 [ HASH CPS(X_STATUS) ]
- Jun 23 19:10:57 debian ipsec[3489]: 11[NET] sending packet: from 172.104.143.35[4500] to 178.205.63.179[20642] (92 bytes)
- Jun 23 19:10:57 debian ipsec[3489]: 14[NET] received packet: from 178.205.63.179[20642] to 172.104.143.35[4500] (108 bytes)
- Jun 23 19:10:57 debian ipsec[3489]: 14[ENC] parsed TRANSACTION response 3042743947 [ HASH CPA(X_STATUS) ]
- Jun 23 19:10:57 debian ipsec[3489]: 14[IKE] IKE_SA IKEv1-Xauth[3] established between 172.104.143.35[CN=vpn.krasovsky.me]...178.205.63.179[10.184.115.78]
- Jun 23 19:10:57 debian ipsec[3489]: 14[IKE] destroying duplicate IKE_SA for peer 'savely', received INITIAL_CONTACT
- Jun 23 19:10:57 debian ipsec[3489]: 14[CFG] lease 192.168.103.1 by 'savely' went offline
- Jun 23 19:10:57 debian charon[3507]: 16[ENC] parsed TRANSACTION request 3214253577 [ HASH CPRQ(ADDR MASK DNS NBNS U_BANNER U_DEFDOM U_SPLITDNS U_SPLITINC U_LOCALLAN VER) ]
- Jun 23 19:10:57 debian ipsec[3489]: 16[NET] received packet: from 178.205.63.179[20642] to 172.104.143.35[4500] (140 bytes)
- Jun 23 19:10:57 debian charon[3507]: 16[IKE] peer requested virtual IP %any
- Jun 23 19:10:57 debian charon[3507]: 16[CFG] reassigning offline lease to 'savely'
- Jun 23 19:10:57 debian charon[3507]: 16[IKE] assigning virtual IP 192.168.103.1 to peer 'savely'
- Jun 23 19:10:57 debian charon[3507]: 16[ENC] generating TRANSACTION response 3214253577 [ HASH CPRP(ADDR DNS DNS DNS6 DNS6) ]
- Jun 23 19:10:57 debian charon[3507]: 16[NET] sending packet: from 172.104.143.35[4500] to 178.205.63.179[20642] (140 bytes)
- Jun 23 19:10:58 debian charon[3507]: 05[NET] received packet: from 178.205.63.179[20642] to 172.104.143.35[4500] (476 bytes)
- Jun 23 19:10:58 debian charon[3507]: 05[ENC] parsed QUICK_MODE request 4039521104 [ HASH SA No ID ID ]
- Jun 23 19:10:58 debian charon[3507]: 05[IKE] received 28800s lifetime, configured 0s
- Jun 23 19:10:58 debian charon[3507]: 05[ENC] generating QUICK_MODE response 4039521104 [ HASH SA No ID ID ]
- Jun 23 19:10:58 debian charon[3507]: 05[NET] sending packet: from 172.104.143.35[4500] to 178.205.63.179[20642] (188 bytes)
- Jun 23 19:10:58 debian charon[3507]: 07[NET] received packet: from 178.205.63.179[20642] to 172.104.143.35[4500] (92 bytes)
- Jun 23 19:10:58 debian charon[3507]: 07[ENC] parsed QUICK_MODE request 4039521104 [ HASH ]
- Jun 23 19:10:58 debian charon[3507]: 07[IKE] CHILD_SA IKEv1-Xauth{3} established with SPIs cbe342bd_i 05d17163_o and TS 0.0.0.0/0 ::/0 === 192.168.103.1/32
- Jun 23 19:10:58 debian charon[3507]: 07[IKE] CHILD_SA IKEv1-Xauth{3} established with SPIs cbe342bd_i 05d17163_o and TS 0.0.0.0/0 ::/0 === 192.168.103.1/32
- Jun 23 19:10:58 debian vpn[3664]: + 10.184.115.78 192.168.103.1/32 == 178.205.63.179 -- 172.104.143.35 == 0.0.0.0/0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement